Announcing Istio 1.13.2
Istio 1.13.2 patch release.
This release fixes the security vulnerabilities described in our March 9th post, ISTIO-SECURITY-2022-004. This release note describes what’s different between Istio 1.13.1 and 1.13.2.
BEFORE YOU UPGRADE
Things to know and prepare before upgrading.
Download and install this release.
Visit the documentation for this release.
Inspect the full set of source code changes.
- CVE-2022-24726: (CVSS Score 7.5, High): Unauthenticated control plane denial of service attack due to stack exhaustion.
Added an OpenTelemetry access log provider. (Issue #36637)
Added support for using default JSON access logs format with Telemetry API. (Issue #37663)
describe podnot showing the VirtualService info if the gateway is set to TLS ingress gateway. (Issue #35301)
Fixed an issue where
traffic.sidecar.istio.io/includeOutboundPortsannotation does not take effect when using CNI. (Issue #37637)
Fixed an issue where when enabling Stackdriver metrics collection with the Telemetry API, logging was incorrectly enabled in certain scenarios. (Issue #37667)
At this time it is not believed that Istio is vulnerable to these CVEs in Envoy. They are listed, however, to be transparent.
CVE-2022-21656 (CVSS Score 3.1, Low):X.509
CVE-2022-21657 (CVSS Score 3.1, Low): X.509 Extended Key Usage and Trust Purposes bypass.